1835 Commits

Author SHA1 Message Date
Steve Wilkerson
b117b14c3a Update helm version to 2.14.1
This updates the helm version from 2.13.1 to 2.14.1

Change-Id: I619351d846253bf17caa922ad7f7b0ff19c778a2
Signed-off-by: Steve Wilkerson <sw5822@att.com>
2019-06-25 21:33:20 +00:00
Zuul
73bc44bc32 Merge "Fluentd: Remove readOnly flag from /var/log mount" 2019-06-25 19:57:58 +00:00
Zuul
edf41fe792 Merge "Fluentd: Add deployment conditional for probes" 2019-06-25 19:57:56 +00:00
Pete Birley
e80c7f8aac Gate: Store helm values for release
This PS stores the applied helm values for releases in the gate.

Change-Id: I6563104ded6631b63d9fced775b9b9dba7fd00ef
Signed-off-by: Pete Birley <pete@port.direct>
2019-06-25 18:54:09 +00:00
Zuul
a35ded2efc Merge "Gate: Simpler multiple distro/over-ride support" 2019-06-25 16:41:25 +00:00
Steve Wilkerson
6321a01c1e Fluentd: Add deployment conditional for probes
This adds a conditional check on the deployment type of the
Fluentd chart to determine whether to enable the current liveness
and readiness probes or not.  The current probes are designed
around using fluentd as an aggregator and do not function properly
when fluentd is deployed as a daemonset.  When run as a daemonset
and configured to tail files via the tail input plugin, fluentd
will prioritize reading the entirety of those files before
processing other input types, including opening the forward source
socket required for the current probes to function correctly. This
results in scenarios where the current probes will fail when in
fact fluentd is functioning correctly.

Daemonset focused probes to come as a follow on once a proper path
forward has been determined

Change-Id: I8a164bd47ce1950e0bd6c5043713f4cde9f85d79
Signed-off-by: Steve Wilkerson <sw5822@att.com>
2019-06-25 06:32:25 -05:00
Zuul
0952475aed Merge "Open openvswitch_db_server port 6640 to interact with SDN controller" 2019-06-25 03:28:06 +00:00
Zuul
28d3cb538b Merge "Remove fluent-loggin from network-policy" 2019-06-25 03:28:05 +00:00
Zuul
0267c8fa77 Merge "Ingress: Update config to be compatible with k8s schema validation" 2019-06-25 03:25:17 +00:00
Jugwan Eom
833d426da8 fix host-specific overrides incorrectly overwriting previous values
root_conf area is used for host-specific configuration and overwritten in
each round of loop. It causes that all hosts will share same properties.
This makes use each host's own area in the loop.

Task: 34282
Story: 2005936

Change-Id: I0afb0b32ab80456aa3439b4221f2a95ca05ddf24
2019-06-25 02:34:02 +00:00
Zuul
9e95a497c0 Merge "Trivial typo fixes" 2019-06-25 00:49:00 +00:00
Pete Birley
d60fe161a5 Ingress: Update config to be compatible with k8s schema validation
This PS updates the ingress controller configmap to be valid with
k8s schema validation turned on.

Change-Id: Ibbc82be62398ee63eb353aa58f1ebdf98e66b30d
Signed-off-by: Pete Birley <pete@port.direct>
2019-06-24 23:54:23 +00:00
Pete Birley
2bb0dcb5b0 Gate: Simpler multiple distro/over-ride support
This PS indroduces a simpler way to incorp over-rides into gate
runs, and also ensures that they are scoped to a single chart, rather
than all of the charts deployed within a gate run.

Change-Id: Iba80f645f33c6d5847fbbb28ce66ee3d23e4fce8
Signed-off-by: Pete Birley <pete@port.direct>
2019-06-24 14:16:17 -05:00
Kabanov, Dmitrii (dk370c)
44c1dcc4c9 [etcd] Move etcd storage to tmpfs
The PS allows to use tmpfs for etcd during the gates.
There is an assumption that it will improve the performance and
will allow to get rid of weird issues.

Change-Id: Id68645b6535c9b1d87c133431b7cd6eb50fb030e
2019-06-24 11:14:21 -07:00
Dejaeger, Darren (dd118r)
083956e37b Add node selector to Ceph test pods
This PS looks to add a node selector into the Ceph test pod's
specs.

Change-Id: If73a5036c5e6a651393f81a136874b9e8a52b4f1
2019-06-24 17:41:09 +00:00
MegHeisler
d5af61b751 Remove fluent-loggin from network-policy
This removes the old fluent-logging chart from network
policy and replaces it with the new fluentbit and fluentd
charts. This will return the network policy gate back to
passing

Change-Id: I060c6c3034fa798a131a053b9d496e5d8781c55d
2019-06-24 16:14:05 +00:00
Steve Wilkerson
1df9cee5c1 Fluentd: Remove readOnly flag from /var/log mount
This removes the readOnly flag from the /var/log mount for the
fluentd pod to allow for using the file buffer mechanism when
desired

Change-Id: I23f0f03824eec5b142d3f2e8e42e8d07cddfe618
Signed-off-by: Steve Wilkerson <sw5822@att.com>
2019-06-24 11:11:52 -05:00
Alexander Noskov
e315c90de3 Trivial typo fixes
Change-Id: I255f76aa4ff253452d39d89850dfd75488dc6b38
2019-06-24 06:31:31 +00:00
Jian Li
0146cf98ba Open openvswitch_db_server port 6640 to interact with SDN controller
This change allows the openvswitch to interact with SDN controller
(e.g., ONOS, ODL) through 6640 port.

Story: 2005763
Task: 33473

Change-Id: Ifcbb6a157c230fa729d295ef0d3fb9a16fff60a2
2019-06-24 09:33:11 +09:00
Zuul
3d3f74de69 Merge "[Ceph] Update helm tests for ceph-provisioners" 2019-06-23 04:34:38 +00:00
Zuul
65f78190ba Merge "Add zuul-jobs roles to job job that uses them" 2019-06-22 12:19:09 +00:00
Zuul
49bb4ed703 Merge "add docker-default apparmor profile for prometheus-alertmanager Add in prometheus-alertmanager gate script as a script" 2019-06-22 12:01:01 +00:00
Kostiantyn Kalynovskyi
0e0858a7c7 Add zuul-jobs roles to job job that uses them
Job openstack-helm-infra uses role named "start-zuul-console" that is part
of another project named "zuul/zuul-jobs". If this job is
ever used by another project as "parent job", it would fail, because
wouldn't find the role in any of the default pathes. This patch adds the
roles from zuul/zuul-jobs project, to the job that uses these roles from
the project

Change-Id: Ib3b7e0e43008b7a4f394b49b75529bfde9780d2f
2019-06-22 10:13:45 +00:00
Randeep Jalli
1c4084bdc0 add docker-default apparmor profile for prometheus-alertmanager
Add in prometheus-alertmanager gate script as a script

Change-Id: I3c10f9a9d4403fd91da292a50d204f73a9295611
2019-06-22 10:13:18 +00:00
Hussey, Scott (sh8121)
9b00075a72 (helm-toolkit) Optionally b64 encode TLS keys
- When using the TLS certificate generation macro, optionally
  support base64 encoding values for direct inclusion in a Kubernetes
  secret. The default is to maintain current behavior for backward
  compatibility.

Change-Id: Ib62af4e5738cbc853a18e0d2a14c6103784e7370
2019-06-22 10:12:49 +00:00
Zuul
736995c1d2 Merge "Fix indentations" 2019-06-22 01:26:32 +00:00
Zuul
4b609516f2 Merge "[Ceph] Implement pool quotas on pools as they are created/managed" 2019-06-21 19:59:24 +00:00
Zuul
c893836808 Merge "[Ceph] Modify CRUSH map for changes to existing deployments" 2019-06-21 19:45:16 +00:00
Kabanov, Dmitrii (dk370c)
e580e0204b [Ceph] Update helm tests for ceph-provisioners
The changes allow to provide more information in case of failure.

Change-Id: Ie03cafac33ef9b2cf457e0d483d838170eadaef4
2019-06-20 11:19:51 -07:00
Taylor, Stephen (st053q)
d74b579f1d [Ceph] Implement pool quotas on pools as they are created/managed
This patch set implements pool quotas on each pool in the Ceph
cluster by obtaining the total capacity of the cluster in bytes,
multiplying that by the defined percentage of total data expected
to reside in each pool and by the cluster quota, and setting a
byte quota on each pool that is equal to its expected percentage
of the total cluster quota.

Change-Id: I1686822a74c984e99e9347f55b98219c47decec1
2019-06-20 10:16:47 -05:00
Taylor, Stephen (st053q@att.com)
810026f342 [Ceph] Modify CRUSH map for changes to existing deployments
This adds the ability for the ceph-osd osd-directory.sh script to
handle existing deployments that place data in hosts via CRUSH and
modify those deployments to place data in racks instead. The
existing data remains intact but is redistributed across the new
rack-level failure domains by updating the CRUSH map and assigning
new rules to existing pools.

Change-Id: Ida79f876d0cae3d99e796e4de1aac55a7978986c
2019-06-20 10:14:30 -05:00
Hussey, Scott (sh8121)
3844f4af77 (postgresql) Support update strategy snippet
- Add support for the update strategy helm-toolkit snippet

Change-Id: I7abedec017cb043a38f4e176028d76fdc505de12
2019-06-20 13:15:53 +00:00
Hemant
79a2b09d4b Add OpenStack instance panel to grafana dashboard
Add new openstack instance panel to grafana dashboard to see the status
of instances.

Change-Id: I42c62bca73dd3d257154a3141f8902d607789ac3
2019-06-20 12:56:00 +02:00
Venkata, Krishna (kv988c)
50889f8643 Fix indentations
Found incorrect indentations in YAML. This
PS redresses the indentation issue.

Change-Id: Id8d00e07a209a0fd1c98823deb59dc15a87ba16d
2019-06-19 17:11:37 -05:00
Zuul
eefcf33f61 Merge "[Ceph]: Remove duplicate values" 2019-06-19 20:39:48 +00:00
Zuul
1ee8f34084 Merge "Ingress: add keepalived-router-id for keeplived vip" 2019-06-19 19:50:02 +00:00
Zuul
fed00f9e04 Merge "Add openstack-exporter to aio-monitoring & openstack-support jobs" 2019-06-19 18:21:52 +00:00
SIRI KIM
9022c9237d Ingress: add keepalived-router-id for keeplived vip
When there are multiple keepalived instances in same network space,
equal keepalived router-ids cause conflict (now default router-id number
is 100). So we have to specify keepalived's router_id for VRRP peering.
This commit make keepalived route-id configurable, so that we can
prevent keepalived conflict caused by default keepalived router-id.

Change-Id: Ia92a8b64205ab52ad15237e9fdeaacb61aae6400
2019-06-19 18:06:04 +00:00
Zuul
843db92744 Merge "Change the expression of defined alert in prometheus to avoid unnecessary errors" 2019-06-19 16:55:46 +00:00
Venkata, Krishna (kv988c)
d1964b7b38 [Ceph]: Remove duplicate values
secret_keystone_rgw is defined twice in
same section in lines 548 and 550.

Change-Id: I8f76a6f0f4105d47efbc562d190f2eabf51764c1
2019-06-19 16:45:05 +00:00
Steve Wilkerson
f2db36862c Add openstack-exporter to aio-monitoring & openstack-support jobs
This deploys the openstack-exporter as part of the aio-monitoring
single node and openstack-support jobs, to ensure the exporter is
functional and working as expected

Change-Id: If31046769fd9032647af47ce8fce0cde5b8f7d7d
Signed-off-by: Steve Wilkerson <sw5822@att.com>
2019-06-19 16:38:10 +00:00
Pete Birley
fc58be6a93 Ingress: Clean prometheus-nginx.socket on startup
This PS cleans the prometheus-nginx.socket on startup of the container,
which is required to allow the container, as opposed to the pod, restart.

Change-Id: I7906e85a200f6fb92467371218b4e5957add39f4
Signed-off-by: Pete Birley <pete@port.direct>
2019-06-19 14:02:56 +00:00
Jean-Philippe Evrard
8ee35e896f Adapt rabbitmq test for py2 and py3 support
This works well for python2, but things will become
messy when py3 will be the default.

This, at the same time, ensures the KeyErrors are
properly logged, with a way to debug them.

Change-Id: If5d8007bece9ccbff481187e757968e7d1b6f651
2019-06-19 03:19:08 +00:00
Zuul
5935a2c040 Merge "Fix indent" 2019-06-19 00:17:02 +00:00
Itxaka
565fb4606b htk: provide default domain env and secrets
We currently do not provide any env or secrets for the
default domain id for keystone

This makes it so we provide both like any other vars

Change-Id: I00c68026af25d8c5af37fcb3a6e1bb0e2da13e1e
2019-06-18 21:51:24 +00:00
Zuul
0f7ced71dc Merge "RabbitMQ: Allow clients to directly connect to servers" 2019-06-18 21:46:13 +00:00
Zuul
79582a1ba5 Merge "Elasticsearch: Allow override of job back off limits and deadlines" 2019-06-18 21:18:47 +00:00
Zuul
80d7e932e4 Merge "Switch from default values being populated for upgrade strategy for ceph components" 2019-06-18 21:18:15 +00:00
Hemant
b9a9ee323b Change the expression of defined alert in prometheus to avoid unnecessary errors
There were some false alerts about volume_claim_capacity_high_utilization
due to wrong formula used to determine the percentage of used capacity.

Change-Id: I24afed7946f915e5e13f0ba759eca252c2598af9
2019-06-18 20:19:29 +00:00
Pete Birley
0925f50e2a RabbitMQ: Allow clients to directly connect to servers
This PS updates the rabbitmq chart, to allow clients to connect directly
to backend servers, and also introduces a htk function to produce
the appropriate transport_url used by oslo.messaging to take advantage
of this functionaility.

Change-Id: I5150a64bd29fa062e30496c1f2127de138322863
Signed-off-by: Pete Birley <pete@port.direct>
2019-06-18 15:10:26 +00:00